15
@achrispace olling and monitoring privileged access ce Product Marketing ace

For CIOs and CISOs: every user is a privileged user, learn how to deal with

Embed Size (px)

Citation preview

@achrispace

Controlling and monitoring privileged access

Chris PaceHead of Product Marketing

@achrispace

@achrispace

Every user is a privileged user

@achrispace

CISOFTSE100 Company18 years of IT security experience

“Privileged access is the beast we still haven’t tamed”

@achrispace

The goal of every malicious outsider?To become a privileged insider.

WallixAdminBastion is a privileged user management solution. It’s designed to give you comprehensive control, monitoring and reporting for access to servers and other devices across your network.

@achrispace

Sharing of accounts and passwords by internal IT staff.

@achrispace

Meeting compliance requirements

@achrispace

Third party service providers and contractors.

@achrispace

Reducing your biggest security risk in the shortest possible time.

Privileged user management

How Wallix helps:

• WAB becomes a single point of entry for users to all your network devices• Users have a single account for access to multiple resources • Greater control over users who need access changes or leave your organisation• Control access by parameters such as IP address, day and time or session type• Ideal for managing contractors or external service providers

Monitoring and traceability

Monitoring and traceability

How Wallix helps:• User activity can be constantly monitored in realtime alerting a manager or denying

access if particular actions are attempted• Goes beyond event logging by tracing every single mouse click and keyboard stroke

using system log information and optical character recognition• Command line sessions like SSH as well as UI sessions on Windows servers are can

all be recorded• Recorded sessions can be viewed as text or recorded as videos which can be viewed

and downloaded instantly

Password management

Password management

How Wallix helps:• Users never need to have local access to servers• It’s easy to manage users who should no longer have access to particular

resources without having to worry about accounts on the devices themselves• This helps to protect your infrastructure from any unauthorised access

particularly for contractors or employees who have left your organisation